[FreeCoursesOnline.Me] Pluralsight - Ethical Hacking-Hacking Wireless Networks

Torrent Details


[FreeCoursesOnline.Me] Pluralsight - Ethical Hacking-Hacking Wireless Networks

NAME
[FreeCoursesOnline.Me] Pluralsight - Ethical Hacking-Hacking Wireless Networks.torrent
CATEGORY
Other
INFOHASH
089f823426816f905b6648d64d656ab08d2b82a1
SIZE
512 MB in 52 files
ADDED
Uploaded on 12-03-2022 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

Lynda and other Courses >>> https://www.freecoursesonline.me/
Forum for discussion >>> https://1hack.us/



Created by : Dale Meredith
Language : English
Updated : Feb 24, 2022
Duration : 3h 36m
Course Source : https://www.pluralsight.com/courses/hacking-wireless-networks-ethical-hacking-ceh-cert

About

Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the [CEH 312-50] exam.

Description

Wireless technologies have changed our world, but it’s also given hackers another attack vector . In this course, Ethical Hacking: Wireless Hacking, you’ll learn to look at your wireless infrastructures the way attackers do and what you can do to protect your organization using the skills of an Ethical Hacker. First, you’ll explore the concepts of wireless technologies, from transmission types to antenna types. Next, you’ll discover the threats and methodologies used by hackers to attack your networks. Finally, you’ll learn how to [protect your wireless infrastructures with countermeasures. When you’re finished with this course, you’ll have the skills and knowledge of ethical hacking needed for the [CEH 312-50] exam.

Level

• Intermediate

About Author

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government. Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices. Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud.

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Websites you may like/How you can help our Group!.txt204 B
1. Course Overview/1. Course Overview.mp44.7 MB
2. Comparing Wireless Terminologies/01. The Method to My Madness.mp42.8 MB
2. Comparing Wireless Terminologies/02. CEH Exam Study Tips.mp418.8 MB
2. Comparing Wireless Terminologies/03. Key Terms.mp414.7 MB
2. Comparing Wireless Terminologies/04. Advantages and Disadvantages.mp48.2 MB
2. Comparing Wireless Terminologies/05. Types of Wi-Fi Networks.mp42.4 MB
2. Comparing Wireless Terminologies/06. Standards.mp414.6 MB
2. Comparing Wireless Terminologies/07. Wi-Fi Authentication Modes.mp43.6 MB
2. Comparing Wireless Terminologies/08. Chalking.mp48.4 MB
2. Comparing Wireless Terminologies/09. Antenna Types.mp413.8 MB
2. Comparing Wireless Terminologies/10. Learning Check.mp42.6 MB
3. Summarizing Wireless Encryption/1. WEP Encryption.mp47.9 MB
3. Summarizing Wireless Encryption/2. WPA and WPA2 Encryption.mp414.1 MB
3. Summarizing Wireless Encryption/3. WPA3- The New Kid on the Block.mp47 MB
3. Summarizing Wireless Encryption/4. Breaking Encryption.mp49.7 MB
3. Summarizing Wireless Encryption/5. Defense Measures.mp43.1 MB
3. Summarizing Wireless Encryption/6. Demo- Examining the Encryption Options.mp410.1 MB
3. Summarizing Wireless Encryption/7. Learning Check.mp42.1 MB
4. Appraising Wireless Threats/1. Type of Attacks.mp416.1 MB
4. Appraising Wireless Threats/2. Demo- WarDriving.mp4110 MB
4. Appraising Wireless Threats/3. Access Point Attacks.mp47.6 MB
4. Appraising Wireless Threats/4. Demo- Looking Known Networks.mp44.5 MB
4. Appraising Wireless Threats/5. Client Attacks.mp411.2 MB
4. Appraising Wireless Threats/6. Learning Check.mp42.9 MB
5. Illustrating the Wireless Attack Methodology/01. Step 1- Discovery.mp47.1 MB
5. Illustrating the Wireless Attack Methodology/02. Demo- Finding WPS-enabled APs.mp49.1 MB
5. Illustrating the Wireless Attack Methodology/03. Step 2- GPS Mapping.mp446.3 MB
5. Illustrating the Wireless Attack Methodology/04. Step 3- Wireless Traffic Analysis.mp48.2 MB
5. Illustrating the Wireless Attack Methodology/05. Demo- Using Your Phone and Wi-Fi Analyzer.mp44.4 MB
5. Illustrating the Wireless Attack Methodology/06. Step 4- Launching an Attack.mp42.4 MB
5. Illustrating the Wireless Attack Methodology/07. Demo- Finding Hidden SSIDs.mp42.4 MB
5. Illustrating the Wireless Attack Methodology/08. Evil Twin Attacks.mp43.4 MB
5. Illustrating the Wireless Attack Methodology/09. Demo- Evil Twins.mp424.7 MB
5. Illustrating the Wireless Attack Methodology/10. Wi-Jacking Attack.mp43.1 MB
5. Illustrating the Wireless Attack Methodology/11. Step 5- Cracking Encryption.mp41.9 MB
5. Illustrating the Wireless Attack Methodology/12. Demo- Cracking WPA Using Aircrack-ng.mp423 MB
5. Illustrating the Wireless Attack Methodology/13. Learning Check.mp42.7 MB
6. Explaining Bluetooth Hacking/1. Explaining Bluetooth.mp44.2 MB
6. Explaining Bluetooth Hacking/2. Methods of Attack.mp46.5 MB
6. Explaining Bluetooth Hacking/3. Bluetooth Threats.mp42.4 MB
6. Explaining Bluetooth Hacking/4. Demo- Using BluetoothView to Scan for Devices.mp410.3 MB
6. Explaining Bluetooth Hacking/5. Learning Check.mp41.9 MB
7. Distinguishing Wireless Countermeasures/1. The Six Layers of Security.mp43.2 MB
7. Distinguishing Wireless Countermeasures/2. Defending WPAs.mp44.4 MB
7. Distinguishing Wireless Countermeasures/3. Stopping KRACK and aLTEr Attacks.mp42.6 MB
7. Distinguishing Wireless Countermeasures/4. Countermeasures for Rogue APs.mp41.9 MB
7. Distinguishing Wireless Countermeasures/5. Overall Best Practices.mp44.3 MB
7. Distinguishing Wireless Countermeasures/6. Bluetooth Attack Countermeasures.mp42.6 MB
7. Distinguishing Wireless Countermeasures/7. Learning Check.mp48.2 MB
8. Domain Summary/1. Domain Summary.mp45.1 MB
Exercises.zip14.7 MB

Alternative Torrents for 'FreeCoursesOnline.Me Pluralsight Ethical HackingHacking Wireless Networks'.

There are no alternative torrents found.